Cryptography's Terms and background "All nature is merely a cipher and a secret writing." Blaise de Vigenère In the (dis-)information age getting information but at the same time excluding others from it is part of a power-game (keeping the other uneducated). The reason for it eventually has found an argument called security. Compared to the frequency of its presence in articles, the news and political speeches security seems to be one of the most popular words of the 90's. It must be a long time ago when that word was only used for and by the military and the police. Today one can find it as part of every political issue. Even development assistance and nutrition programs consider it part of its work. The so-called but also real need for information security is widespread and concerning everybody, whether someone uses information technology or not. In any case information about individuals is moving globally; mostly sensitive information like about bank records, insurance and medical data, credit card transactions, and much much more. Any kind of personal or business communication, including telephone conversations, fax messages, and of course e-mail is concerned. Not to forget further financial transactions and business information. Almost every aspect of modern life is affected. We want to communicate with everybody - but do not want anybody to know. Whereas the market already depends on the electronic flow of information and the digital tools get faster and more sophisticated all the time, the rise of privacy and security concerns have to be stated as well. With the increase of digital communication its vulnerability is increasing just as fast. And there exist two (or three) elements competing and giving the term digital security a rather drastic bitter taste: this is on the one hand the growing possibility for criminals to use modern technology not only to hide their source and work secretly but also to manipulate financial and other transfers. On the other hand there are the governments of many states telling the population that they need access to any kind of data to keep control against those criminals. And finally there are those people, living between enlightening security gaps and at the same time harming other private people's actions with their work: computer hackers. While the potential of global information is regarded as endless, it is those elements that reduce it. There is no definite solution, but at least some tools have been developed to improve the situation: cryptography, the freedom to encode those data that one does not want to be known by everybody, and give a possibility to decode them to those who shall know the data. During the last 80 years cryptography has changed from a mere political into a private, economic but still political tool: at the same time it was necessary to improve the tools, eventually based on mathematics. Hence generally cryptography is regarded as something very complicated. And in many ways this is true as the modern ways of enciphering are all about mathematics. "Crypto is not mathematics, but crypto can be highly mathematical, crypto can use mathematics, but good crypto can be done without a great reliance on complex mathematics." (W.T. Shaw) For an introduction into cryptography and the mathematical tasks see: |
|
Disney Founded in 1929 Disney primarily engages in child and adult entertainment. Starting with the production of animated motion-picture cartoons in the late 1940s Disney began to make also nature documentaries and live-action motion pictures, as well as short cartoons and live-action programs for television. In 1955 the company opened Disneyland, which was their first amusement park. Further openings of amusement parks in the U.S. and Europe followed. In 1996 Disney acquired Capital Cities/ABC Inc., which owned the ABC television network. |
|
AOL Time Warner The largest media conglomerate in the world, Time Warner resulted from the merger of the publisher Time Inc. and the media company Turner Broadcasting Systems, Inc. in 1996. Time Inc. founded in 1922 primarily concentrated on magazines and books and in the 1950s moved into the broadcasting and entertainment industry, but in the 1970s announced that it was selling its broadcasting holdings and concentrating on cable television. In 1989 Time Inc. merged with Warner Communications Inc., which besides being a major motion-picture and television studio, was also one of the biggest U.S. music recordings producers and cable-television operators. In January 2000 Time Warner merged with AOL (America Online) in a US$ 243.3 billion deal. Although AOL so far generated far less profit and turnover than Time Warner its quotation on the stock exchange was clearly higher, making Time Warner the junior partner (45 percent) in the new company. Through its merger with AOL, which is a major player in the online-business and owns several Internet-services like Compuserve, Netscape and Netcenter, the new media conglomerate could significantly enlarge its online presence and also complement its traditional media activities. |
|
Extract of AOL Time Warner’s Content Production and Distribution Holdings The following selection does not claim to present an exhaustive listing, but rather picks some of the company's most important assets. Due to the rapid developments in the world of media giants the list is also subject to changes. Cable TV Systems and Channels/Networks Cable TV channels/networks (some part-owned): HBO, HBO Plus, HBO Signature, HBO Family, HBO Comedy, HBO Zone, Cinemax, MoreMAX, ActionMAX, ThrillerMAX, HBO en Espa-ol, Comedy Central, Court TV, HBO Ole, HBO Asia, HBO Central Europe, Movies, TV, Video Production, and Movie Theaters Warner Bros. film studio Warner Bros. Television production studios Warner Bros. Home Video Turner worldwide Home Video Turner Pictures Castle Rock Entertainment movie production company New Line Cinema movie production company Warner Bros. film library Turner Film Library Hanna Barbera Cartoons Owns many movie houses, with over 1,000 screens, around the world Book Publishing Time Life Inc. Book-of-the-Month Club Warner Books Little, Brown and Company Oxmoor House Leisure Arts Sunset Books Magazines Time, People, Sports Illustrated, Fortune, Life, Money, Parenting, In Style, Entertainment Weekly, Cooking Light, Baby Talk, First Moments, Coastal Living, Health, Progressive Farmer, Southern Accents, Southern Living, Sports Illustrated, For Kids, Sunset, Teen People, Time for Kids, Weight Watchers, Mutual Funds, Your Company, Asiaweek, President, Wallpaper. Hippocrates Recorded Music Warner Music Group The Atlantic Group Elektra Entertainment Group Rhino Entertainment Sire Records Group Warner Bros. Records Warner Music International WEA Inc. WEA Corp. WEA Manufacturing Ivy Hill Corp. Warner Special Products Alternative Distribution Alliance Giant Merchandising Deals with record labels include: Maverick records Tommy Boy Sub Pop Qwest 143 Records Internet and New Media About 130 Websites including: CNN.com, AllPolitics.com, CNNSI.com, Time Digital, People, Southern Living, Sports Illustrated Turner New Media Online Services including: Compuserve, Netscape, Netcenter Pro Sports Teams and Promotions Atlanta Braves major league baseball team Atlanta Hawks NBA basketball team World Championship Wrestling Goodwill Games Other Six Flags entertainment/excursion parks Warner Bros. Movie World theme park Over 150 Warner Bros. stores, plus Turner Retail Group 25 % stake in Atari 14 % stake in Hasbro Business Connections with Other Media Companies Joint ventures, equity interests or major arrangements with |
|
Challenges for Copyright by ICT: Introduction Traditional copyright and the practice of paying Yet again new technologies have altered the way of how (copyrighted) works are produced, copied, made obtainable and distributed. The emergence of global electronic networks and the increased availability of digitalized intellectual property confront existing copyright with a variety of questions and challenges. Although the combination of several types of works within one larger work or on one data carrier, and the digital format (although this may be a recent development it has been the object of detailed legal scrutiny), as well as networking (telephone and cable networks have been in use for a long time, although they do not permit interactivity) are nothing really new, the circumstance that recent technologies allow the presentation and storage of text, sound and visual information in digital form indeed is a novel fact. Like that the entire information can be generated, altered and used by and on one and the same device, irrespective of whether it is provided online or offline. |
|
Asymmetric or Public-Key-Cryptosystems Here the keys for encryption and decryption differ. There needs to exist a private key, which is only known to the individual, and a public key, which is published. Every person has her or his own private key that is never published. It is used for decrypting only. Mathematically the different keys are linked to each other, still it is nearly impossible to derive the private key from the public one. For sending a message to someone, one has to look up the other's public key and encrypt the message with it. The keyholder will use his/her private key to decrypt it. While everybody can send a message with the public key, the private key absolutely has to stay secret - and probably will. "The best system is to use a simple, well understood algorithm which relies on the security of a key rather than the algorithm itself. This means if anybody steals a key, you could just roll another and they have to start all over." (Andrew Carol) very famous examples for public-key systems are: · RSA: The RSA is probably one of the most popular public-key cryptosystems. With the help of RSA, messages can be encrypted, but also digital signatures are provided. The mathematics behind are supposedly quite easy to understand (see: · PGP: PGP is a public key encryption program. Most of all it is used for e-mail encryption. It is supposed to be quite safe - until now. · PGPi is simply the international variation of PGP. for further information about the RSA and other key-systems visit the RSA homepage: or: All of those tools, like hash functions, too, can help to enhance security and prevent crime. They can theoretically, but sometimes they do not, as the example of the published credit card key of France in March 2000 showed. For more information see: Still, cryptography can help privacy. On the other hand cryptography is only one element to assure safe transport of data. It is especially the persons using it who have to pay attention. A key that is told to others or a lost cryptographic key are the end of secrecy. |
|
Enochian alphabet Also "Angelic" language. Archaic language alphabet composed of 21 letters, discovered by John Dee and his partner Edward Kelley. It has its own grammar and syntax, but only a small sample of it has ever been translated to English. |
|
Microsoft Corporation Founded by Bill Gates and Paul Allen and headquartered in Redmond, USA, Microsoft Corporation is today's world-leading developer of personal-computer software systems and applications. As MS-DOS, the first operating system released by Microsoft, before, Windows, its successor, has become the de-facto standard operating system for personal computer. According to critics and following a recent court ruling this is due to unfair competition. For more detailed information see the Encyclopaedia Britannica: |
|
Braille Universally accepted system of writing used by and for blind persons and consisting of a code of 63 characters, each made up of one to six raised dots arranged in a six-position matrix or cell. These Braille characters are embossed in lines on paper and read by passing the fingers lightly over the manuscript. Louis Braille, who was blinded at the age of three, invented the system in 1824 while a student at the Institution Nationale des Jeunes Aveugles (National Institute for Blind Children), Paris. |
|